Course Overview

Overall Proficiency Level:

3 - Advanced

Course Prerequisites:

Students must have at least one year of hands-on experience in computer security. The CompTIA Security+ and the Certified Information Systems Security Professional (CISSP) certifications and applicable knowledge are recommended. Students must have a strong understanding of the TCP/IP Protocol Suite, IP Routing and LAN Switching Concepts, name resolution protocols, and Internet technologies. A minimum of 12 months experience in networking or Cisco CCNA certification is recommended.

Training Purpose:

Functional Development

Skill Development

Specific Audience:

All

Delivery Method:

Classroom

Online, Instructor-Led

Course Location:

3110 North Central Ave. STE 160

Phoenix, AZ85012

Certified Ethical Hacker

Classroom

Online, Instructor-Led

Course Description

Certified Ethical Hacker is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. It delivers technical depth of the content with an emphasis on vulnerability assessment, risk assessment, and penetration testing. This class immerses students in an interactive environment where they learn how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. The majority of the class is hands-on labs with instruction to explain, reinforce, and show how these hacking tools and techniques can be used to secure and defend real world networks.

Learning Objectives

Students will learn how to scan, test, hack and secure systems. Through the use of hand-on labs, students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about:

Intrusion Detection

Policy Creation

Social Engineering

DDoS Attacks

Buffer Overflows and Virus Creation

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.